nas/app/lib/fasp/request.rb
2025-05-23 06:43:02 +00:00

60 lines
1.8 KiB
Ruby

# frozen_string_literal: true
class Fasp::Request
COVERED_COMPONENTS = %w(@method @target-uri content-digest).freeze
def initialize(provider)
@provider = provider
end
def get(path)
perform_request(:get, path)
end
def post(path, body: nil)
perform_request(:post, path, body:)
end
def delete(path, body: nil)
perform_request(:delete, path, body:)
end
private
def perform_request(verb, path, body: nil)
url = @provider.url(path)
body = body.present? ? body.to_json : ''
headers = request_headers(verb, url, body)
key = Linzer.new_ed25519_key(@provider.server_private_key_pem, @provider.remote_identifier)
response = HTTP
.headers(headers)
.use(http_signature: { key:, covered_components: COVERED_COMPONENTS })
.send(verb, url, body:)
validate!(response)
response.parse if response.body.present?
end
def request_headers(_verb, _url, body = '')
{
'accept' => 'application/json',
'content-type' => 'application/json',
'content-digest' => content_digest(body),
}
end
def content_digest(body)
"sha-256=:#{OpenSSL::Digest.base64digest('sha256', body || '')}:"
end
def validate!(response)
content_digest_header = response.headers['content-digest']
raise Mastodon::SignatureVerificationError, 'content-digest missing' if content_digest_header.blank?
raise Mastodon::SignatureVerificationError, 'content-digest does not match' if content_digest_header != content_digest(response.body)
raise Mastodon::SignatureVerificationError, 'signature-input is missing' if response.headers['signature-input'].blank?
key = Linzer.new_ed25519_public_key(@provider.provider_public_key_pem)
Linzer.verify!(response, key:)
end
end